Thank you a lot for this share of precious informations. This seems like a fascinating environnement. Thanks again
@edvinte19 күн бұрын
viking 🗣️🔥
@stoneman591926 күн бұрын
hey bro, How to hook an application if it is reinforced ?
@hlcd-71913 ай бұрын
Hello, Can i did same thing with IOS Apps, i have IOS App that need to subscribe to unlimited
@MioLifeReset3 ай бұрын
Good afternoon sir, is it possible to crack an application like an injector using a login using this method?
@alexdin15655 ай бұрын
That's amazing
@isaakbruno74375 ай бұрын
hi how i can contact you? for a custom project
@user-sh1fv9mm2v6 ай бұрын
thank you very much, helped me alot!
@RomySaputraSihananda7 ай бұрын
makasih abangku sayang 🤯🤯🥳🥳🥳🥳😥😥😥
@Shekelgrubb2287 ай бұрын
Hi, I am trying to reproduce the steps (dicer app) I am using real rooted device, android 13, Frida 16.1.11 and for instance frida-trace does not capture the clicks or other interactions in real time. Also I use the same script as yours but it does not print out the arguments, could someone please help ?thank you
@wrathofainz7 ай бұрын
And here I was just staring at decompiled smali code xD
@darrenpayne41147 ай бұрын
FFFAAARRRKKK i hate GREAT getting started videos that completely dont mention any setup information for people. i felt so over my head when i switched to linux. thats what made cody from nullbyte so good. he would always start off with heres what im using and the tools you'll need to follow this video "now that you have these tools installed we can begin" but i guess if noobs arent your target audience i suppose
@darrenpayne41147 ай бұрын
so guys if your using linux, to connect to your android over usb look at setting up android=sdk maybe look at scrcpy....youll figure it out
@wrathofainz7 ай бұрын
Best thing to do is when you encounter running something new like adb at 5:44 just look up how to install and use it. Seems tedious, but that's research.
@nathanfrancecyrexfgtsbalan41028 ай бұрын
Bro, if I pay you, will you break an apk for me?
@asdfasdfasdf38310 ай бұрын
Simply amazing. Of course most real world apps won't have such a convenient "hideAds" flag, but great for educational purposes anyway. High quality video.
@SubNovelBL Жыл бұрын
friend, I would like to know if you could make the subtitles in English officially available because the subtitles automatically generated by KZbin are terrible and there is little quality content like yours
@njack4806 Жыл бұрын
Great video
@fairyroot1653 Жыл бұрын
I really appreciate the work you do, I mod apps and use Frida, it's good to see them married in one video.
@linkzap3 ай бұрын
are you ope fo commissions ?
@fairyroot16533 ай бұрын
@@linkzap sure
@mhamademad Жыл бұрын
frida-trace -J doesn't work anymore it seems like...
@mhamademad Жыл бұрын
there is not a single browser as secure as firefox.
@mhamademad Жыл бұрын
hm
@mhamademad Жыл бұрын
ur really good at this damn
@LuisSantos-dk1ox Жыл бұрын
Thanks for making this Video. Do you guys make or have more resources like this that dives deep using Frida for more complex mobile applications ? Besides Frida documentation, and the owasp UnCrackable exercises.
@talhahOne Жыл бұрын
can anyone help me out, I have got a apk. I just want to see if it can be re engineered. any programmers expert of android coding etc etc. its a apk file. Cheers
@khanra17 Жыл бұрын
Great video please don't whisper
@serialkiller8783 Жыл бұрын
why did you pass const/4 while patching smali ? why not just const v11?
@codemad Жыл бұрын
Continue the tutorial like this BTW how to online bypass signature
@yonatanhaldarov Жыл бұрын
WHERE HAVE YOU BEEN A YEAR AGO! Thanks for the video, I have a question that is not particularly frida related - Do you know if it is possible to fake a dns response to an android emulator or phone that are not connected to the internet, namely StandAlone? More specifically - I am reversing an app that is sending a lot of requests to multiple servers and than waits for the right encrypted response from the server. Then the app decrypts it and compares it to a const string. I wanted to fake the response with the encrypted string to have a proof that I am correct with my decryption. I will be glad if you'll answer, Thanks!
@0xffsweden918 Жыл бұрын
Glad you liked it! In your situation I would probably have the phone tether network over USB to a computer running dnsmasq (can act as a dhcp server and serve fake dns responses) and a web server. If the app is using SSL you'll need to install a custom CA certificate and possibly disable cert pinning in the app if used.
@itsamitsh Жыл бұрын
May I ask How to run Frida on real device that is not rooted ? Help is highly appreciated.
@yonatanhaldarov Жыл бұрын
I will suggest to ask chatGpt, I am sure its answer will satisfy you :) Nevertheless, I read that it is possible by installing frida-gadget or something like that, have fun!
@itsamitsh Жыл бұрын
@@yonatanhaldarov u have a packed one apk with Frida gadget
@CorruptedModz2nd Жыл бұрын
you probably cant, mayby an virtual space apk but wouldt know how to replicate it
@eloyam9973 Жыл бұрын
This is so cool
@DavisFreimanis2 жыл бұрын
Really good talk! I was able to replicate the TV4Play example on my phone, but I was not required to bypass the certificate pinning. Did you install a certificate for your MitM proxy on the phone? I installed my Burp certificate as a system certificate and that worked without a problem.
@0xffsweden9182 жыл бұрын
Thanks. Yes, I didn't go into detail of the MITM-setup but you're absolutely right in that it requires you to add the proxy CA-cert to the phone. Of course this is only needed for the exploration phase and the final patch works without root or custom CA-certs, yet another reason to have a dedicated phone for testing stuff out on.
@asepd71592 жыл бұрын
Auto subs. What i best method to undetect for example banking app apk in root device? 1. Is that using magisk module, as we know that apk developer will update day by day so we hard to follow frequently every an update that support with magisk module. 2. Reverse engineering updateble apk with downgrade manifest? 3. You suggestion sir?
@0xffsweden9182 жыл бұрын
Great question. Personally I would never do banking on a rooted phone considering all the security implications, so that rules out option 1. I would patch the app statically and recompile and if there is an issue that it keeps getting updated I usually just change the app package name to not have the app store app recognize it.
@testingchannel42032 жыл бұрын
Great instructional video, could You possible make one with Frida + Flutter? Not SSL pinning but some patching on the fly with frida? To print some values out that goes in and goes out from onClick functions? Thanks.
@aliaziz4982 жыл бұрын
did you have any articles video book websites .. any things that related to android reverse engineering
@forsalw47822 жыл бұрын
how to find encryption and decryption method in an application please this is very important
@forsalw47822 жыл бұрын
how to find encryption and decryption method in an application please this is very important
@munnahossen98472 жыл бұрын
:gar:
@user-sh1fv9mm2v2 жыл бұрын
This is wonderful! Thanks
@neerajverma92263 жыл бұрын
Hello how to find native codes/decompile it?
@MrAnhell3 жыл бұрын
Are you available for hire?
@den_36963 жыл бұрын
You can decompile smali to java with jadx
@blocksource41922 жыл бұрын
Can you please let me know more about this? Do you have documentation available for me to work with this?
@hds71783 жыл бұрын
how to disable network connection for ads in smali.
@sleepyNovember_project2 жыл бұрын
By exploring code with attention bro And deleting everything what can be deleted in classes for ads
@onelgates2 жыл бұрын
Please indicate a concrete answer and sample in deleting in classes for ads
@rickyray27943 жыл бұрын
"all without touching the phone.... except for when we plugged up the rubber ducky" lmao, no good shit man. Question though, since most androids are USB-C will a normal USB-USBC converter work?
@BatteryProductions3 жыл бұрын
awesome!
@ivypanny38133 жыл бұрын
thank you and I look forward to see more detail tutorial for beginners......this is great
@dheaamohammad12653 жыл бұрын
can i dm you i need help please
@user4gent4163 жыл бұрын
2160p ? wft
@opticalbeast49473 жыл бұрын
Where is a book/guide/pdf on reading and understanding the smali from decompiled dex files.
@GameSmilexD2 жыл бұрын
if anyone else has the same question just use google
@obi169211 ай бұрын
Search "whats-the-best-way-to-learn-smali-and-how-when-to-use-dalvik-vm-opcodes" And you will find a stackoverflow post with some resources
@Mobile-yi6bf17 күн бұрын
I understand 100% your comment I see so many sites and video but not anyone explain Smali codes 😢
@mm-musicmiso81583 жыл бұрын
I need to learn reverse engineering sir. I got cheated by teen patti apps. They are fraud and cheaters. All pri planned. I need to screw them. I need to do mod for app. Help me 8073196425,